article thumbnail

The noodle soup of B2B IAM and third-party identities

Thales Cloud Protection & Licensing

The noodle soup of B2B IAM and third-party identities madhav Wed, 02/26/2025 - 07:29 Introduction: A messy bowl of terminology Identity management is no longer just about employees. B2B IAM The Hidden Value of Third-Party Identities. So why is B2B IAM such a tangled mess of terminology, and does it really matter?

B2B 71
article thumbnail

Third-Party Identities: The Weakest Link in Your Cybersecurity Supply Chain

Security Affairs

A recent report, B2B IAM – The Hidden Value of Third-Party Identities , indicates that external identities outnumber traditional employees by nearly two to one. While conventional “internal” employees account for 29% of identities, non-employees or “external identities” in aggregate (contractors, vendors, etc.)

B2B 123
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inside the DemandScience by Pure Incubation Data Breach

Troy Hunt

It's the old "data is the new oil" analogy that recognises how valuable our info is, and as such, there's a market for it.

article thumbnail

How B2B IAM helps build business agility

Thales Cloud Protection & Licensing

How B2B IAM helps build business agility madhav Tue, 09/17/2024 - 04:25 In today’s interconnected business environment, the spotlight often shines on security, especially as organizations face increasing risks tied to human error. Effective business-to-business (B2B) relationships are essential for achieving operational agility.

B2B 62
article thumbnail

The Unattributable "Lead Hunter" Data Breach

Troy Hunt

Not only would it be a hugely laborious exercise, there's also the question of whether I'm providing data to the actual owner of it and in an era of an untold number of account compromises every single day, no, just controlling the associated email address isn't proof of ownership.

article thumbnail

B2B IAM in Agricultural Machinery: Building a Seamless and Secure Future for Manufacturers

Thales Cloud Protection & Licensing

B2B IAM in Agricultural Machinery: Building a Seamless and Secure Future for Manufacturers madhav Tue, 09/10/2024 - 07:01 As global food demand continues to rise, agricultural machinery manufacturers face growing pressure to modernise and adopt sustainable practices.

B2B 62
article thumbnail

MY TAKE: Peerlyst shares infosec intel; recognizes Last Watchdog as a top cybersecurity influencer

The Last Watchdog

Started by infosec professionals, Peerlyst takes the characteristics of B2B communications we’ve become accustomed to on Twitter and LinkedIn and directs it toward cybersecurity. You can do so by submitting an email address or log in with your LinkedIn account. I’m honored to be included. It’s easy to participate on Peerlyst.

InfoSec 37